GSM Security and the protocols involves in a mobile environment authentication process
资源简介:GSM Security and the protocols involves in a mobile environment authentication process
上传时间: 2017-05-01
上传用户:417313137
资源简介:Behavior Analysis and Game Theory Modeling in a Peer Code Review Process - v1.doc
上传时间: 2016-08-19
上传用户:haohaoxuexi
资源简介:A book describle in detail about the system security and usability technology. It is a system book on security.
上传时间: 2015-07-22
上传用户:zmy123
资源简介:A Java package (library/API) to connect and use the Yahoo Instant Messager and Chat protocols (YMSG), in a reasonably coder-friendly and abstract way. Although methods the API exposes are closely matched to Yahoo IM features, the API attemp...
上传时间: 2015-09-14
上传用户:zhaiyanzhong
资源简介:f your application uses MFC in a shared DLL, and your application is in a language other than the operating system s current language, you will need to copy the corresponding localized resources MFC42XXX.DLL from the Microsoft Visual C+...
上传时间: 2013-12-24
上传用户:thuyenvinh
资源简介:If your application uses MFC in a shared DLL, and your application is in a language other than the operating system s current language, you will need to copy the corresponding localized resources MFC42XXX.DLL from the Microsoft Visual C...
上传时间: 2014-01-02
上传用户:iswlkje
资源简介:Basic function to locate and measure the positive peaks in a noisy data sets. Detects peaks by looking for downward zero-crossings in the smoothed third derivative that exceed SlopeThreshold and peak amplitudes that exceed AmpThresho...
上传时间: 2017-04-26
上传用户:彭玖华
资源简介:it is a progrma that aim to caculate an average value, pi value and the pris number in java enviroment
上传时间: 2013-12-12
上传用户:lxm
资源简介:THis is a web framework that use to do text parsing and extraction and update the text extract in a notepad file into the website. Using Django and mysql.
上传时间: 2013-12-25
上传用户:vodssv
资源简介:This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in th...
上传时间: 2016-03-08
上传用户:wangdean1101